2.3 - Robust Programs

2.3 - Robust Programs

KG - University

39 Qs

quiz-placeholder

Similar activities

G10 Computer Science Unit Revision 1

G10 Computer Science Unit Revision 1

12th Grade

35 Qs

6.7 Databases Quiz

6.7 Databases Quiz

10th - 11th Grade

35 Qs

GCSE Unit 2.3 - Producing Robust Programs

GCSE Unit 2.3 - Producing Robust Programs

9th Grade

34 Qs

UNIT 2.3 ROBUST PROGRAMS

UNIT 2.3 ROBUST PROGRAMS

10th Grade

40 Qs

GCSE Computer Science - 2.3: Producing Robust Programs

GCSE Computer Science - 2.3: Producing Robust Programs

9th - 11th Grade

40 Qs

GCSE ICT U1 Topics 1-6 Revision

GCSE ICT U1 Topics 1-6 Revision

5th - 9th Grade

36 Qs

2.3 Robust Programs MCQs

2.3 Robust Programs MCQs

11th Grade

39 Qs

J277 1.1 Hardware

J277 1.1 Hardware

9th - 11th Grade

40 Qs

2.3 - Robust Programs

2.3 - Robust Programs

Assessment

Quiz

Computers

KG - University

Hard

Used 196+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is not a method for ensuring a program is robust?
Keeping passwords safe
Data Validation
Authentication
Data Sanitisation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is data validation?
Checking that the data entered is wrong
Checking that the data entered is correct
Checking that the data entered is sensible or reasonable
Checking that the data has been entered by the correct person

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these authentication methods is most secure?
Password
Password and username
Key Card
Physical and Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is these IS NOT an example of validation
Checking the number entered is 2 digits
Asking a user to enter the same data in twice
Use of a Lookup table
Use of a presence check

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 When a program runs it asks the user to enter their full name. Which is an example of Valid data? 
Mr Jones
Sarah
Sarah Jones
Mrs Jones

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a range check do?
Checks data across a range of numbers
Checks the data is within an acceptable range
Where three types of data are used
Checks that the data is in the correct format

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of these is not a method for planning for misuse?
Limiting the number of login attempts
Requesting a password and user name
Authentication
Not validating the data entry

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers